Key threats
While the future threat landscape may look increasingly challenging to navigate safely, senior leaders can take proactive steps to enhance their organisation’s security posture and maintain control over their business strategies.
We draw on extensive collaboration with organisations across global business, government bodies, legislators and cyber security experts to provide the concrete guidance needed to stay ahead of future threats.

Threat Horizon provides a two-year outlook on emerging cyber risks, acting as a guide for security and business leaders to navigate an uncertain future.
The Threat Horizon 2027 Executive View offers a high-level view of the trends and risks most likely to inflict lasting change over coming years.
What should be on your radar?
Our latest forecast has exposed a range of threats that will require attention at the highest levels of the organisation. For leaders, developing an understanding of what each of these means for businesses is a necessity for effective planning.
1
Identity underpins every action
Deepfake proliferation
Criminals use AI‑generated voices and images to impersonate employees or executives, facilitating fraud and degrading trust.
Identity scams and bots
With automation and bots managing critical systems, malicious entities exploit weaknesses in identity verification processes.
Illegitimate identities
Businesses struggle to trust digital interactions as they cannot distinguish real users from fake ones, leading to operational disruptions and data breaches.
2
Geopolitics impacts every plan
Conflict zones
Regional instability leads to cyber attacks either indirectly, directly or through the exploitation of supply chain weaknesses.
Global fragmentation
The world splits into distinct trade blocs, each of which has its own ideas on how organisations can operate. This adds complexity to cross-border operations and creates additional risks that need to be addressed.
Regulatory overload
A push for localised political stability leads to stringent regulations, particularly around AI ethics, data privacy, and environmental sustainability.
3
Data sustains every business
AI-driven threats
AI tools are leveraged to create sophisticated cyber attacks (e.g. shapeshifting malware, AI-driven phishing scams) that defeat existing protections and surpass levels of employee awareness.
Shadow AI
Uncontrolled use of AI within businesses leads to untrusted outputs, data leakage and legal-regulatory compliance challenges.
Data pollution
Misinformation and bot activity pollute data sources, reducing their reliability for accurate decision-making.
1
Identity underpins every action
Deepfake proliferation
Criminals use AI‑generated voices and images to impersonate employees or executives, facilitating fraud and degrading trust.
Identity scams and bots
With automation and bots managing critical systems, malicious entities exploit weaknesses in identity verification processes.
Illegitimate identities
Businesses struggle to trust digital interactions as they cannot distinguish real users from fake ones, leading to operational disruptions and data breaches.
2
Geopolitics impacts every plan
Conflict zones
Regional instability leads to cyber attacks either indirectly, directly or through the exploitation of supply chain weaknesses.
Global fragmentation
The world splits into distinct trade blocs, each of which has its own ideas on how organisations can operate. This adds complexity to cross-border operations and creates additional risks that need to be addressed.
Regulatory overload
A push for localised political stability leads to stringent regulations, particularly around AI ethics, data privacy, and environmental sustainability.
3
Data sustains every business
AI-driven threats
AI tools are leveraged to create sophisticated cyber attacks (e.g. shapeshifting malware, AI-driven phishing scams) that defeat existing protections and surpass levels of employee awareness.
Shadow AI
Uncontrolled use of AI within businesses leads to untrusted outputs, data leakage and legal-regulatory compliance challenges.
Data pollution
Misinformation and bot activity pollute data sources, reducing their reliability for accurate decision-making.
“Secure now is not necessarily secure later."
